Sciweavers

6318 search results - page 1218 / 1264
» Data Leakage Detection
Sort
View
3DPVT
2006
IEEE
190views Visualization» more  3DPVT 2006»
15 years 6 months ago
3D City Modeling Using Cognitive Loops
3D city modeling using computer vision is very challenging. A typical city contains objects which are a nightmare for some vision algorithms, while other algorithms have been desi...
Nico Cornelis, Bastian Leibe, Kurt Cornelis, Luc J...
CVPR
2006
IEEE
15 years 6 months ago
Automatic Landmark Tracking and its Application to the Optimization of Brain Conformal Mapping
Anatomical features on cortical surfaces are usually represented by landmark curves, called sulci/gyri curves. These landmark curves are important information for neuroscientists ...
Lok Ming Lui, Yalin Wang, Tony F. Chan, Paul M. Th...
DFT
2006
IEEE
130views VLSI» more  DFT 2006»
15 years 6 months ago
Off-Chip Control Flow Checking of On-Chip Processor-Cache Instruction Stream
Control flow checking (CFC) is a well known concurrent checking technique for ensuring that a program’s instruction execution sequence follows permissible paths. Almost all CFC...
Federico Rota, Shantanu Dutt, Sahithi Krishna
GLOBECOM
2006
IEEE
15 years 6 months ago
A Directional MAC Protocol for Practical Smart Antennas
- Recently, several MAC protocols using directional antennas, typically referred to as directional MAC protocols, have been proposed for wireless ad hoc networks. However, the MAC ...
Yuya Takatsuka, Katsushiro Nagashima, Masanori Tak...
ISCA
2006
IEEE
169views Hardware» more  ISCA 2006»
15 years 5 months ago
Balanced Cache: Reducing Conflict Misses of Direct-Mapped Caches
Level one cache normally resides on a processor’s critical path, which determines the clock frequency. Directmapped caches exhibit fast access time but poor hit rates compared w...
Chuanjun Zhang
« Prev « First page 1218 / 1264 Last » Next »